Cloud-oriented interactive privacy protection method and system

A privacy protection, interactive technology, applied in the field of interactive privacy protection, can solve problems such as research, difficult ciphertext, etc., to achieve the effect of ensuring security

Active Publication Date: 2017-03-22
ZHEJIANG GONGSHANG UNIVERSITY
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after ordinary encryption technology encrypts data, it is difficult to use ciphertext for research, and homomorphic encryption technology provides this possibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-oriented interactive privacy protection method and system
  • Cloud-oriented interactive privacy protection method and system
  • Cloud-oriented interactive privacy protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]What the present invention adopts is the BGV fully homomorphic encryption scheme (Z.Brakerski, C.Gentry, and V.Vaikuntanathan.(leveled) fully homomorphic encryption without bootstrapping.TOCT, 6(3): 13, based on RLWE with higher efficiency at present. 2014.Preliminary version in ITCS 2012.), in order to facilitate understanding, the principle of fully homomorphic encryption will be introduced first.

[0035] First, parameter setting. The fully homomorphic encryption scheme adopted in the present invention is based on a polynomial ring, and the polynomial ring d is the power of 2, λ is the security parameter of the homomorphic encryption scheme, the ciphertext polynomial coefficient is the modulus q of μ bits, L is the depth of the binary operation circuit, other parameters (d=d(λ,μ,b), n=n(λ,μ,b), χ=χ(λ,μ,b)) to ensure that 2 λ security. n=1 is to set instantiation based on RLWE. In order to make fully homomorphic encryption suitable for the global anonymous algor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud-oriented interactive privacy protection method and system. The privacy protection method is characterized in that a data owner uploads encrypted data and stores the encrypted data on a cloud server for a long time, and data sharing services meeting privacy protection requirements are provided; when a client sends a data request, anonymization processing of the encrypted data is directly carried out on the cloud server, and the data meeting the privacy protection requirements is output; and during the anonymization processing, the cloud server can interact with a proxy server for comparison processing of ciphertext data. The method has the advantages that the data stored in an encrypted manner can serve multiple purposes; and diversified privacy protections can be easily achieved. The privacy protection system has two preconditions: a cloud service provider may be a privacy attacker, but the services must be provided according to a protocol; and the client promises not to forward an obtained data sheet to any unauthorized third party (including the cloud service provider), so that conspiratorial attacks are prevented.

Description

technical field [0001] The invention relates to the field of privacy protection, in particular to a cloud-oriented interactive privacy protection method and system. Background technique [0002] With the advent of the era of cloud computing, people are more and more fond of using the convenience and scalability of the cloud platform for data storage and computing in the cloud, and more and more technologies rely on cloud computing-related services and platforms. . In the cloud computing mode, the data owner will upload a large amount of data to the cloud through the network for processing, but there are unreliable factors in the cloud, and the personal privacy information in the data may be leaked during transmission, storage and processing. . Therefore, the research on privacy protection in cloud environment has become an important research direction in the field of privacy protection. [0003] Using encryption methods to encrypt outsourced data is a convenient way to ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06G06F21/60G06F21/62H04L29/08
CPCH04L9/008H04L63/0442G06F21/602G06F21/6254H04L67/56
Inventor 刘君强陈芳慧董燕萍
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products